<img alt="" src="https://secure.wine9bond.com/223206.png" style="display:none;">
iLobby logo

ON-DEMAND WEBINAR

From Paper to Pixels

Physical Security Technology for a Safer Facility

In this ASSP hosted webinar, security expert Jason Roup (Security Technology Manager at BASF) outlines how businesses can shift from traditional paper systems to digital security technologies, and how this transition can bolster security, streamline operations, and cut costs.

ASSP Webinar: From Paper to Pixels - Physical Security Technology for a Safer Facility

Digitization Best Practices

Digitization Best Practice #1

Assess the problem and requirement before adopting new technologies.

Digitization Best Practice #2

Efficiently use collected data and avoid over-collecting to reduce risk.

Digitization Best Practice #3

Regular technology updates are essential to prevent obsolescence and potential risks.


Watch the Webinar to Learn About

Effective Data Management in Security

Effective Data Management in Security

Dive into the importance of optimizing the use of collected data. Understand strategies for utilizing access logs to detect patterns in unauthorized access and the significance of collecting only essential data to mitigate risks in case of breaches. This proactive approach allows security professionals to tailor their defenses more precisely, enhancing overall security posture.

Future-Proofing Security with Purposeful Technology

Future-Proofing Security with Purposeful Technology

The pace of technological evolution presents a dual-edged sword; while new technologies offer enhanced capabilities for securing assets, they also introduce new vulnerabilities. Learn how to select and integrate new technologies in security operations, focusing on their relevance and benefits. Gain insights into balancing asset value with the cost of technological investments and maximizing existing systems before venturing into new purchases.

Modernizing Your Security Program

Modernizing Your Security Program

Explore the transition from manual processes to digital systems, highlighting the benefits of increased efficiency and accuracy. The shift from manual to digital security processes is not merely a trend but a necessary evolution to address the complexities of modern threats. Digital systems offer unparalleled advantages in terms of scalability, automation, and precision in threat detection and response. This modernization effort extends beyond technology adoption; it encompasses a cultural shift within the organization, advocating for continuous learning and adaptation.

The Integral Role of IT in Security

The Integral Role of IT in Security

The symbiosis between IT and security teams is critical in creating a resilient defense against increasingly sophisticated cyber threats. This partnership is founded on the mutual goal of safeguarding the organization's digital infrastructure. IT's expertise in system architecture and network management complements the security team's focus on threat intelligence and risk management. Together, they implement comprehensive security measures, such as robust firewalls, strong encryption protocols, and regular system audits.

While data collection and analysis are vital for pre-emptive security measures, it's equally crucial to be discerning about what data is collected. This approach not only maximizes the effectiveness of security strategies but also ensures that new risks aren't inadvertently introduced.

"Every professional should be looking at their collection of data as a countermeasure... Our job is to reduce risk, not create new ones"

Jason Roup, Security Technology Manager, North America, BASF

Presenters

Jason Roup, CISSP, Security Technology Manager, North America, BASF

Jason Roup, CISSP
Security Technology Manager, NA
BASF

Jason Roup is a veteran in the security technology sector. His expansive career began with the U.S. Army before he moved on to pivotal roles at Pfizer, Hemlock Semiconductor, Dow Corning, and currently BASF. His vast experience across multiple sectors affords him a unique perspective on security technology.

Jeff Gladwish, Chief Revenue Officer, iLobby

Jeff Gladwish
Chief Revenue Officer
iLobby

Jeff Gladwish leads the go-to-market function at iLobby which includes Marketing, Sales, Customer Success, and Revenue Operations. Recently, iLobby was recognized by Deloitte as one of the fastest growing companies in Canada, asserting itself as a leader in facility management, particularly for its visitor and emergency management solutions. 

Frequently Asked Questions

How can data management enhance physical security?

Effective data management plays a crucial role in physical security. By utilizing access logs to identify patterns in unauthorized access attempts, security professionals can anticipate and prevent security breaches. However, it's vital to balance data collection with privacy concerns, ensuring only necessary data is collected and stored to protect personal identifiable information (PII) and reduce risks in the event of a data breach. 

What are the best practices for adopting new security technologies?

When considering new security technologies, such as AI or video analytics, it's important to ensure they serve a distinct purpose in security operations and address existing issues. Before making investments, assess the value of the assets you're safeguarding to justify the cost. Additionally, maximizing the potential of existing system features before investing in new technologies is a cost-effective approach to modernizing security systems.

How important is the role of IT in modern security programs?

IT plays an integral role in fortifying modern security programs against cyber threats. Collaborating closely with IT teams can help identify potential vulnerabilities and ensure data safety. Building robust firewalls, employing strong encryption, and conducting regular system audits are critical steps to protect against potential cyber threats. Moreover, encouraging education in technology-related fields for security professionals equips them with the necessary digital skills to adapt to evolving security challenges.